[Bug 125816] Re: linux-image postinst matches header_postinst_hook for postinst_hook incorrectly
Phillip Lougher
phillip at ubuntu.com
Wed Dec 19 02:03:22 UTC 2007
linux-source-2.6.22 (2.6.22-14.47) gutsy-security; urgency=low
[Security]
* wait_task_stopped: Check p->exit_state instead of TASK_TRACED
(CVE-2007-5500)
* [TCP]: Make sure write_queue_from does not begin with NULL ptr
(CVE-2007-5501)
* [IEEE80211]: avoid integer underflow for runt rx frames (CVE-2007-4997)
* [JFFS2] Fix ACL vs. mode handling. (CVE-2007-4849)
* minixfs: limit minixfs printks on corrupted dir i_size (CVE-2006-6058)
* NFS: Fix the mount regression
[Fabio Massimo Di Nitto]
* fix DLM regression
[Tim Gardner]
* linux-image postinst matches header_postinst_hook for postinst_hook
incorrectly
- LP: #125816
[Upstream Kernel Changes]
* [SPARC64]: Fix bugs in SYSV IPC handling in 64-bit processes.
* [SPARC64]: Fix register usage in xor_raid_4().
* [NIU]: Fix write past end of array in niu_pci_probe_sprom().
* [NIU]: getting rid of __ucmpdi2 in niu.o
* [SPARC64]: Do not use alloc_bootmem*low().
* [SPARC64]: Fix bogus '&' conditinal in set_rtc_mmss().
* [FUTEX]: Fix address computation in compat code.
* [NIU]: Fix link LED handling.
* [SPARC64]: Fix memory controller register access when non-SMP.
* [SPARC64]: Fix endless loop in cheetah_xcall_deliver().
* [SPARC64]: Fix two kernel linear mapping setup bugs.
-- Phillip Lougher <phillip at ubuntu.com> Thu, 13 Dec 2007 23:57:58
+0000
** Changed in: linux-source-2.6.22 (Ubuntu)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2006-6058
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-4849
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-4997
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-5500
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-5501
--
linux-image postinst matches header_postinst_hook for postinst_hook incorrectly
https://bugs.launchpad.net/bugs/125816
You received this bug notification because you are a member of Kernel
Bugs, which is a bug contact for kernel-package in ubuntu.
More information about the kernel-bugs
mailing list